{"title":"云系统中各种DDoS攻击及其影响的前期研究","authors":"Jones S.B Ribin, N. Kumar","doi":"10.1109/ICOEI.2019.8862722","DOIUrl":null,"url":null,"abstract":"Cloud Computing has emerged into an inevitable platform for computing services by effectively implementing Service Oriented Architecture (SOA) and Virtualization. However it is still vulnerable to traditional security threats and offers scope for innovative security attacks such as EDoS [1]. While it offers platform to generate innumerable Virtual components from a single physical component, it inadvertently provides wide spectrum of possibilities for distributed attacks. Moreover such attacks have adapted to cloud platform and have exploited various inherent vulnerabilities. In an unprecedented manner, they became unpredictable, evasive and challenging to Cloud Security measures. Therefore various versions of DDoS attack that targets the cloud platform have been extensively researched and narrated. The Cloud Security faces unprecedented challenges such as the Single-point-of-Failure occurs when a Cloud Supervisory Component or hypervisor fails due to a security breach. Moreover Cloud requirements often require being liberal to meet the Clients needs. This does not help the CSP to adapt traditional stringent security measures in Cloud System the reasons have been discussed in details.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Precursory study on varieties of DDoS attacks and its implications in Cloud Systems\",\"authors\":\"Jones S.B Ribin, N. Kumar\",\"doi\":\"10.1109/ICOEI.2019.8862722\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud Computing has emerged into an inevitable platform for computing services by effectively implementing Service Oriented Architecture (SOA) and Virtualization. However it is still vulnerable to traditional security threats and offers scope for innovative security attacks such as EDoS [1]. While it offers platform to generate innumerable Virtual components from a single physical component, it inadvertently provides wide spectrum of possibilities for distributed attacks. Moreover such attacks have adapted to cloud platform and have exploited various inherent vulnerabilities. In an unprecedented manner, they became unpredictable, evasive and challenging to Cloud Security measures. Therefore various versions of DDoS attack that targets the cloud platform have been extensively researched and narrated. The Cloud Security faces unprecedented challenges such as the Single-point-of-Failure occurs when a Cloud Supervisory Component or hypervisor fails due to a security breach. Moreover Cloud requirements often require being liberal to meet the Clients needs. This does not help the CSP to adapt traditional stringent security measures in Cloud System the reasons have been discussed in details.\",\"PeriodicalId\":212501,\"journal\":{\"name\":\"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)\",\"volume\":\"207 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOEI.2019.8862722\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI.2019.8862722","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Precursory study on varieties of DDoS attacks and its implications in Cloud Systems
Cloud Computing has emerged into an inevitable platform for computing services by effectively implementing Service Oriented Architecture (SOA) and Virtualization. However it is still vulnerable to traditional security threats and offers scope for innovative security attacks such as EDoS [1]. While it offers platform to generate innumerable Virtual components from a single physical component, it inadvertently provides wide spectrum of possibilities for distributed attacks. Moreover such attacks have adapted to cloud platform and have exploited various inherent vulnerabilities. In an unprecedented manner, they became unpredictable, evasive and challenging to Cloud Security measures. Therefore various versions of DDoS attack that targets the cloud platform have been extensively researched and narrated. The Cloud Security faces unprecedented challenges such as the Single-point-of-Failure occurs when a Cloud Supervisory Component or hypervisor fails due to a security breach. Moreover Cloud requirements often require being liberal to meet the Clients needs. This does not help the CSP to adapt traditional stringent security measures in Cloud System the reasons have been discussed in details.